Static task
static1
Behavioral task
behavioral1
Sample
8a182d22da66af7d4737980a26d55dd3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a182d22da66af7d4737980a26d55dd3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8a182d22da66af7d4737980a26d55dd3_JaffaCakes118
-
Size
278KB
-
MD5
8a182d22da66af7d4737980a26d55dd3
-
SHA1
4eec01008bb640a1cf9a1fc1a858642e9362752b
-
SHA256
e09a2a0f24ef862cc112ed9eae93475262462ad807b96726573c33b72e1f8c82
-
SHA512
8d7c1fad68d0e9908e809aa6bc2eba68c40be2969b1f56c99b1c83549900918929698cb85c8eee7bea3faaf96f6e5130507886ffeb5372dd29f48652006db2c6
-
SSDEEP
6144:4egQn1D3OwriJt1DznSwIAeeKcGmKhu/CbHvoy9o7S7DMCqhaV:/gE3Owri/5znUAstqC0iMnhaV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a182d22da66af7d4737980a26d55dd3_JaffaCakes118
Files
-
8a182d22da66af7d4737980a26d55dd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
a6e9e233feacf2c7d9466d9daad5b009
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
GetCurrentThreadId
GetSystemTimeAsFileTime
ExitProcess
LoadLibraryA
GetLastError
GetCommandLineA
GetModuleFileNameA
GetTickCount
GetModuleHandleA
PostQueuedCompletionStatus
CallNamedPipeA
msvcrt
wcsncat
bsearch
_isctype
wcscmp
wcsncmp
_beginthread
_ltoa
tolower
_wtoi
sprintf
fopen
_pctype
_wfullpath
_getcwd
_wcslwr
_snprintf
_acmdln
_ltow
strcmp
wcscat
_access
qsort
strspn
_vsnwprintf
strlen
strcpy
wcsncpy
_wcsicmp
malloc
__set_app_type
fprintf
__p__commode
_wfopen
_beginthreadex
_stat
_wsplitpath
_onexit
_chdir
Sections
.text Size: 81KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ